CN101421737B - Method and system for securing interface access via visual array paths in combination with hidden operators - Google Patents

Method and system for securing interface access via visual array paths in combination with hidden operators Download PDF

Info

Publication number
CN101421737B
CN101421737B CN 200680054245 CN200680054245A CN101421737B CN 101421737 B CN101421737 B CN 101421737B CN 200680054245 CN200680054245 CN 200680054245 CN 200680054245 A CN200680054245 A CN 200680054245A CN 101421737 B CN101421737 B CN 101421737B
Authority
CN
China
Prior art keywords
token
user
digital value
array
predetermined pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 200680054245
Other languages
Chinese (zh)
Other versions
CN101421737A (en
Inventor
诺曼·弗兰克·格岑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Paz Ruth safety Canada Ltd
Original Assignee
NORMAN FRANK GOERTZEN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NORMAN FRANK GOERTZEN filed Critical NORMAN FRANK GOERTZEN
Publication of CN101421737A publication Critical patent/CN101421737A/en
Application granted granted Critical
Publication of CN101421737B publication Critical patent/CN101421737B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Abstract

A method and system for securing interface access via visual array patterns in combination with hidden operations improves the security of computer systems and dedicated terminals. A hint display is generated in at least a quasi-random fashion that may be an array of numerical digit values. A user input is received that represents selection of a pattern of elements chosen from the hint display and combined in an algorithm using one or more mathematical, relational and/or logical operations. A pre-defined pattern and algorithm are used to generate a token from the hint display that is compared with the user input to verify that the user knows the pattern and algorithm. Further ease of use can be provided by dividing a hint display array into sub-arrays while providing a clue such as color to indicate each sub-array to the user.

Description

Be used for method and system by visual array paths in combination with hidden operational symbol protection interface access security
Technical field
The present invention relates in general to graphical/textual user interfaces, more particularly, relates to the method and system that is used to protect the machine interface access security.
Background technology
Department of computer science's for example specialized equipment of ATM (Automatic Teller Machine) (ATM) of unifying constantly provides protecting the visit at the interface that avoids unauthorized use.Security on the common this user interface is provided by password or " PIN (Personal Identification Number) " PIN, described password or " PIN (Personal Identification Number) " PIN must be at the individuality of access interface (perhaps, be another machine in some cases) further visit before, offer user interface by input equipment.
By " weak " password or token (token), for example, the safety grades that password or PIN provide is relevant with any degree with its length usually.But same factor has also determined the difficulty of an individual memory token.Equally, the quantity of possible token element values for example, makes simple numeral add the letter bigger security that improves that becomes with respect to numeral usually, and still, the increase of input set size is subject to usually in overall possible values space and uses general word or numeral.
When can be when the user provides " prompting " that encouragement collects token once more, this prompting have also produced potential security breaches, because token can be found by inferring when providing when prompting.Other system comprises the secondary password that has some concrete implications for the token owner, and it can be used in the announcement actual token.For example, the interface can use mother's user birth name or " animal of liking " etc. as secondary password, is used for the basic access token of protection when the user forgets.
Proposed two-dimensional textual or graphical hint systems, be used to satisfy the system that token is imported to utilizing the icon arrangement at random that to select according to the order of sequence or must arranging with the special icon that certain pattern is selected from for example system with the form actual displayed password of " hide word " puzzle.The advantage of all said system is that they can not only be broken through by the machine input that repeats easily.
But above-mentioned all systems can finally disclose their basic token by people's observation, especially when the hiding mechanism of basic token is known priori.For example, be to arrange if known token is hidden mechanism with the special icon that certain pattern is selected, the observer can ignore actual icons and only pay close attention to pattern so.
Token system with improvement " intensity " can rely on the less collection of element input value, can use more long-life password and/or can stride the use of a plurality of systems, and not have compromise to be the same risk than weak passwurd.
Therefore, be desirable to provide a kind of method and system, be used for showing hiding token in prompting, make and can not find token easily by observing token input pattern and value, permission simultaneously uses simple algorithm to create this token.
Summary of the invention
Hiding token in prompting shows makes and can not find that easily the above-mentioned target of token realizes in a kind of method and system by the observation that token is imported.
Described method and system shows that the prompting that comprises a plurality of elements shows that wherein, each element has value and position, and it can be digital array that described prompting shows.Described method and system receives the user input sequence corresponding with the selected pattern sequence of display element in conjunction with the algorithm that utilizes one or more operational symbols to carry out one or more computings on pattern sequence.
Described method and system compares with token by computational token from prompting shows and with user's input, and whether the checking user knows suitable pattern and algorithm.To one or more system resources conduct interviews or to which visit of one or more resources of system by system's control, decide by token and the coupling that the user imports.
The operational symbol that adopts from the pattern computational token can be mathematics (comprising logic) operational symbol or relational operator.Can get rid of one or more pattern elements from token computation, it can decide according to relational calculus or by ignoring one of them pattern element regularly.
Described method can realize or realize in special-purpose terminal with the browser of carrying out in the general-purpose computing system in general-purpose computing system.Described method also can be carried out calculation of coding machine program product at the programmed instruction to the step that is used to carry out described method and be realized.
According to an aspect of the present invention, provide a kind of method that is used to protect the resource that will use by the user, comprising:
Generate prompting and show that described prompting shows and is made up of the element of arranging in array;
In the array of selected array element, provide predetermined pattern;
Each element of predetermined pattern has unique position feature in described array;
At least one predetermined pattern element has digital value;
Show that to described user described prompting shows;
The described unit that makes the described predetermined pattern element that described user shows according to the prompting of described generation is computational token usually;
During calculating described token, make described user carry out at least one computing to described at least one described digital value that falls into the described element of described predetermined pattern, make this token comprise the digital value that at least one is hidden, this digital value of hiding is inequality with the digital value of described at least one described element of carrying out the nonidentity computing thereon;
Make described user token is input to the user interface of Verification System;
Receive described token from described user;
Compare at least one hiding digital value of the token that is received and at least one corresponding digital value of the corresponding token of this Verification System generation; And
Optionally provide visit according to the result of described comparison to described resource.
According to an aspect of the present invention, provide a kind of method of input of the security token that is used to receive resources conseravtion, comprising:
The prompting that generation has at least one quasi-random character shows that described demonstration is made up of the element that each all has value and unique position feature;
The value of the predetermined pattern element that shows according to the prompting of described generation and at least one is fallen at least one computing that the described element of described pattern carries out come computational token;
Show that to the user described prompting shows;
Receive input from described user;
The input of more described token and described reception; And
Optionally provide visit according to described comparative result to resource.
According to a second aspect of the invention, provide a kind of computer system, comprising: storer is used for stored program instruction and data; Processor is couple to described storer and is used to carry out described programmed instruction; Visual display unit is couple to described processor and is used for the output of explicit user interface; And input equipment, be couple to described processor and be used to provide the user interface input; Wherein, the described programmed instruction in the described multi-purpose computer comprises that programmed instruction is used for:
The prompting that generation has at least one quasi-random character shows that described demonstration is made up of the element that each all has value and unique position feature;
The value of the predetermined pattern element that shows according to the prompting of described generation and at least one is fallen at least one computing that the described element of described pattern carries out come computational token;
Show that to the user described prompting shows;
Receive input from described user;
The input of more described token and described reception; And
Optionally provide visit according to described comparative result to resource.
By in conjunction with accompanying drawing hereinafter the preferred embodiments of the present invention more specifically being described, above-mentioned and other target, characteristics and advantage of the present invention will become more obvious.
Description of drawings
Fig. 1 is the system chart that wherein can realize embodiments of the invention.
Fig. 2 is a pictorial diagram of describing user interface according to embodiments of the invention.
Fig. 3 is the process flow diagram that is described in the system's computing that realizes in the method according to an embodiment of the invention.
Embodiment
The present invention utilizes the method that realizes by execution of program instructions, to providing improved security by token or password input reference system.This technology is applicable in computer system or for example substitutes conventional password and PIN input in the special-purpose terminal of ATM.In computer system, the present invention can adopt in the operating system of general-purpose computing system, also can be embedded in the vertical application, perhaps provides by the web interface from downloaded, for example, by extend markup language (XML) program or java script program.The present invention is generally used for protecting the visit to resource, for example, and system login visit, the Financial Information on the ATM and the sign-on access of transaction capabilities or to sign-on access as other secure resources of application program or database.
Except the input of only accepting password or token as the conventional password system and selectively token is handled with itself and storing value are compared, the present invention also generates the random walk token effectively.The well-regulated processing of the set by the value hidden during the prompting of presenting to the user is shown generates token at random.Two compositions are arranged in processing: 1) pattern, the user selects element sequence by this pattern from prompting shows; And 2) algorithm utilizes in the one or more operational symbols from a plurality of computings that the value that produces to the small part element sequence is carried out to generate token.Prompting shows it can is generting element collection at random, and except the value of element and the scope of value must be suitable for using with the special algorithm that is adopted, and beyond pattern must be suitable for showing, described element set and pattern and algorithm do not have the relation of being scheduled to.Be generated as signal array or other demonstrations at random if prompting shows, so, can before discerning the user, generation show by user identification code or additive method.In case the user is identified, just sequence is selected in the appropriate location from prompting shows.Alternately, if before generating demonstration, discern the user, can at first generate and hiding sequence at the ad-hoc location that prompting shows so, described ad-hoc location is corresponding with the position in the above-mentioned pattern by utilizing another element set that generates at random to produce non-pattern position.
After element sequence is known, with algorithm application in the element sequence value to generate token, it can be the sequence of number, but also can be single number, for example summations of all numbers in the pattern.Any amount of value of operational symbol in can binding sequence, and in output sequence with its minimizing or in output sequence, it is enlarged.For example, the summation of three values of pattern element can represent that output sequence is reduced into 3: 1, still, be applied to two values in the sequence summation, multiply each other and " greater than " operational symbol can represent 2: 3 expansion of output sequence.The operational symbol of using can be (comprising logic) or the relation of mathematics, for example be applied to two numbers " greater than " or " less than " operational symbol.Usually, do not wish to reduce the number of elements in the output sequence, it provides the access token that is lower than certain grade, because short token easier " conjecture ".
The user simulate in the computing of pattern sequence selection and the storer based on the operational symbol algorithm, and according to selecting and token value is imported in mental arithmetic.Desired mental arithmetic sophistication levels can be adjusted by the total algorithm design of selecting suitable operational symbol and user to be provided with.For example, simple algorithm can be passed through the digital array artificial horizon, wherein token sequence value be in the straight line from left to right every pair of numeral than decimal.Very complicated algorithm can be significantly in conjunction with the random site of from value array, selecting in order, and utilize different mathematical operations that they are carried out combination to each value.
In addition, the user is not being changed under the situation of pattern and algorithm, the safety grades of system can change.Pattern can be clipped to reduce desired token length, changes the scope of the value of each element permission, and/or threaded list is defined as static array.In the above-mentioned technology each does not influence basic pattern and the algorithm of distributing to user security mechanism, but can make safety grades and complicacy adapt to the specific access instances of visit or to the visit of particular system.
The present invention also is provided for sharing the mechanism based on the visit information in past, and does not compromise on basic pattern and algorithm.If the owner of access pattern and algorithm knows particular hint and show, so, another people can be apprised of the result and import token and do not compromise on pattern/algorithm combination.
With reference now to accompanying drawing,, especially Fig. 1 has illustrated the networked system that can realize embodiments of the invention therein in block diagram.Described system 10 expression universal computing devices comprise: processor 16 and the storer 17 that is used to store the programmed instruction that data and processor 16 carry out that is couple to processor 16.Graphic alphanumeric display 13 is couple to system 10, and in fact can be integrated in the identical shell, and as common ATM and portable set, for example, notebook/flat computer or PDA(Personal Digital Assistant) are the same.According to embodiments of the invention, keyboard or keypad 14 also are couple to (or being integrated in) system 10 and are used to receive user's input.Alternately, can use positioning equipment, as illustrating hereinafter, utilize positioning equipment input to require the element of all input values all to present on the screen of graphic alphanumeric display 13, yet utilize keyboard or keypad, value need not present on screen.
Network connects 12 wireline interface 15A or the wave point 15B that can be implemented as processor 16, although and the present invention do not require that network connects, for example the equipment of ATM requires to be used for some latticed forms of financial accessing operation usually.
With reference now to Fig. 2,, user interface description is the screen 20 of graphic alphanumeric display 13 according to an embodiment of the invention.Show the prompting of forming by four 3x3 subarray 24A-D and show 23.Each subarray comprises a plurality of elements 26, and each element shows in 23 to have unique position in prompting.Each element 26 has also that possibility is unique also may not unique value.In illustrative example, value is the numerical value in the numeral of each element 26 surface demonstration.But, the invention is not restricted to numeral, be worth also not necessarily relevant display message coupling with corresponding element.For example, graphic icons can be used for Alternative digital, the selection of being undertaken by positioning equipment and can be logical operation with the hidden algorithm of selecting sequence to combine, and it can combine the information that provides in the mode of logic with one or more icons.
Equally, when single array can be used to realize when of the present invention, the use of subarray provides the prompting of another grade to the user, because four subarrays that illustrate can present with any arrangement on screen 24A-D.The user determines suitable subarray 24A-D for each element, and the user is by the clue unique to each subarray 24A-D, and for example, the value (for example, numeral) of unique color framework around each subarray or the color that shows on each element 26 is imported.Screen 20 also comprises the zone 20,21 that is used to import the user name and password, usually as existence such as logon screens.But, input area is not of the presently claimed invention, screen 20 can comprise separately that prompting shows 23, especially when all values of input all has the corresponding element that is presented on the screen 20, in this case, for example the positioning equipment of mouse or touch-screen can be used for realizing receiving the input equipment of sequence of tokens.If the user is previously known identification, if pattern/algorithm is that all users are shared, if perhaps can accept more loose security scheme, wherein, by mating permission and using a plurality of tokens to discern the user, User Recognition zone 20 is unnecessary so.
Can generate the element 26 of subarray 24A-D at random with quasi-random ground, be used for array is carried out initialization.If like this, the pattern of element 26 is used for selecting sequential value from the element 26 corresponding to the known correct element sequence of user.Alternately, can the generting element sequence, in pattern position " generation ", then, " uncorrelated " value that other generate at random can be filled in the position of other elements 26 among the subarray 24A-D.If prompting shows that 23 are divided into subarray, sequence also is necessary for the appropriate location in the correct subarray of each element consideration so.For example, if subarray 24A-D is by painted separately: { red, blue, yellow, green }, the known suitable element sequence of user is a highest delegation redness, the middle row blueness, prompting shown in the basis shows 23 sequence so, from left to right reading this row, is 8,7,3,5,4,2 successively.
The next part of the security mechanisms that the present invention realizes is the combination that utilizes the sequential value of hidden algorithm (opposite with above-mentioned visible pattern).Selected sequence is then carried out computing by at least one operational symbol at least one computing.Operational symbol can be a mathematical operator, for example, add, subtract, take advantage of and remove, and produce element value be equal to (or " duplicating " or " repetition ") operational symbol, perhaps for example " less than " or " greater than " relational operator, can or only carry out computing in some cases to two or more elements to an element.Not every computing all is that identity of operation or algorithm are not the sequences above also only the disclosing of hiding, although system can be embodied as the selection scheme with lower-security grade with " non-hiding " algorithm extraly according to an embodiment of the invention.Be one in each element in the pattern, provide non-hidden algorithm, make the output of algorithm be equal to list entries by identity of operation symbol sequence.Also can adopt and hide constant, for example " each numeral be added 1 " or " if>4, input digit " and similar other rules in conjunction with above-mentioned operational symbol.
As the example of relational calculus, utilize above-mentioned example as sequence, algorithm can return the least member in every row, and in this case, suitable token input can be 3,2.In another example, algorithm can increase preceding two elements of this row for first value, and is that second value is used element, and in this case, correct token is 15,3,9,2.Operations/algorithms also can be extended in subarray.For example, algorithm can with each element in first subarray successively with second subarray in each element multiply each other, and with the result as the token character string.Upward suitable token is 40,28,6 in the routine sequence.
Shown in example, according to the relative complexity that the prompting that can become arbitrarily big shows, have arbitrarily element value on a large scale equally and the complicacy of the algorithm that adopted, the present invention can realize very complicated and strong mechanism.Usually, be convenient to be remembered and the safety grades that provided by particular combinations directly averages out between the two at pattern and algorithm.
With reference now to Fig. 3,, the process flow diagram that illustrates according to the embodiments of the invention method has been described.Can be by in computing equipment, for example personal computer, workstation or as the special-purpose terminal of ATM, the programmed instruction of execution is realized described method.Programmed instruction can be realized in the computer program product of the medium that comprises the described programmed instruction of encoding.Utilize random number generator (step 30) to generate prompting and show, and display reminding shows (step 31).Then, by user ID input area 20 identification users, from memory search user pattern and algorithm (step 32).Then, show collection sequential value (step 33) according to predetermined pattern element from prompting.Then, utilize the value computational token (step 34) of collecting according to pre-defined algorithm.When user's input digit sequence (step 35), the token value of calculating in sequence and the step 33 is compared, if list entries coupling (determining 36) so, is authorized resource to protection conduct interviews (step 37).
According to another embodiment of the invention, also be provided for the control panel of placement algorithm and pattern, and can realize with figure or text mode.The figure control panel usually allows to select pattern sequence by positioning equipment, and with the combination or the single value of regular allocation value of element in the pattern.The text control panel can, for example by utilizing matrix position accept to describe the character string of pattern and algorithm as index, each element can be by Position Number by unique identification.Operational symbol can be endowed their symbol, and for example, " R " expression is duplicated, "+" expression summation, and " X " expression is multiplied each other, " S " expression " less than " or the like.For character string is encoded, can will be attached in the matrix with the tactic any subarray of subarray " original ".
For example, if the Position Number inter-bank is from left to right distributed, and in showing, prompting descends, so above-mentioned exemplary algorithm with each element of first subarray successively with second subarray in each element multiply each other, and with the result as the token character string, can be encoded as " E1XE25; E2XE26; E3XE27 ", wherein, X is " multiplying each other " operational symbol.(as used in last example, element 25-27 is corresponding to the middle row of subarray 24B.)
When the present invention is specifically illustrated and is described in conjunction with the preferred embodiments, it will be appreciated by those skilled in the art that under the situation that does not deviate from the spirit and scope of the present invention and can carry out above-mentioned and other change form of the present invention and details.

Claims (13)

1. method that is used to protect the resource that will be used by the user comprises:
Generate prompting and show that described prompting shows and is made up of the element of arranging in array;
In the array of selected array element, provide predetermined pattern;
Each element of predetermined pattern has unique position feature in described array;
At least one predetermined pattern element has digital value;
Show that to described user described prompting shows;
The described unit that makes the described predetermined pattern element that described user shows according to the prompting of described generation is computational token usually;
During calculating described token, make described user carry out at least one computing to described at least one described digital value that falls into the described element of described predetermined pattern, make this token comprise the digital value that at least one is hidden, this digital value of hiding is inequality with the digital value of described at least one described element of carrying out the nonidentity computing thereon;
Make described user token is input to the user interface of Verification System;
Receive described token from described user;
Compare at least one hiding digital value of the token that is received and at least one corresponding digital value of the corresponding token of this Verification System generation; And
Optionally provide visit according to the result of described comparison to described resource.
2. according to the process of claim 1 wherein, at least two elements of predetermined pattern have digital value, and the described nonidentity computing of wherein said calculating at least one mathematical operation in conjunction with the described digital value of described two elements.
3. according to the method for claim 1, wherein, at least three predetermined pattern elements have digital value, and wherein said calculating utilizes relational operator to select between at least two described digital values of described three elements, and gets rid of at least one not selected digital value of described three elements in the process of determining described result of calculation.
4. according to claim 1,2 or 3 method, also comprise:
Discern described user; And
In response to identification, select described predetermined pattern and described at least one computing from storer according to described identification to described user.
5. according to any one method in the claim 1 to 3, wherein,
But described demonstration shows the matrix that comprises unique recognin array, and wherein, the described position of each element is represented further that by the member relation in the corresponding subarray therefore, described predetermined pattern is easier to be remembered by described user.
6. according to the method for claim 5, wherein, described subarray visually is distinguished from each other with color.
7. according to the method for claim 5 or 6, wherein, each subarray is 3 * 3 arrays of element.
8. according to any one method in the claim 1 to 3, for a plurality of users, wherein said complexity of calculation is provided with independently of one another.
9. according to any one method in the claim 1 to 3, wherein all predetermined pattern elements all have digital value.
10. according to any one method in the claim 1 to 3, wherein not change pattern and computing and change of the safety grades of system is to adapt to safety grades and the complicacy to particular routine.
11. according to the method for claim 10, wherein safety grades changes with the length that reduces token by clipping pattern.
12. according to the method for claim 10, wherein safety grades changes by the scope of the value that is changed to each element and allows.
13. according to the method for claim 10, wherein safety grades changes by pointing out array of display to be defined as static array.
CN 200680054245 2006-03-01 2006-03-01 Method and system for securing interface access via visual array paths in combination with hidden operators Expired - Fee Related CN101421737B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CA2006/000287 WO2007098569A1 (en) 2006-03-01 2006-03-01 Method and system for securing interface access via visual array paths in combination with hidden operators

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201110064468A Division CN102156831B (en) 2006-03-01 2006-03-01 Method and system for protecting interface access security by combining visual array path with hidden operational character

Publications (2)

Publication Number Publication Date
CN101421737A CN101421737A (en) 2009-04-29
CN101421737B true CN101421737B (en) 2011-04-20

Family

ID=38458599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200680054245 Expired - Fee Related CN101421737B (en) 2006-03-01 2006-03-01 Method and system for securing interface access via visual array paths in combination with hidden operators

Country Status (5)

Country Link
EP (1) EP2002371A4 (en)
JP (1) JP2009528601A (en)
CN (1) CN101421737B (en)
CA (2) CA2644272C (en)
WO (1) WO2007098569A1 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100043079A1 (en) * 2006-09-07 2010-02-18 France Telecom Code securing for a personal entity
GB0910545D0 (en) 2009-06-18 2009-07-29 Therefore Ltd Picturesafe
CN101882188B (en) * 2010-06-07 2012-11-07 天地融科技股份有限公司 Method and device for enhancing data input security of electronic signature tool
US8635676B2 (en) 2010-12-16 2014-01-21 Blackberry Limited Visual or touchscreen password entry
US8650635B2 (en) 2010-12-16 2014-02-11 Blackberry Limited Pressure sensitive multi-layer passwords
US8769641B2 (en) 2010-12-16 2014-07-01 Blackberry Limited Multi-layer multi-point or pathway-based passwords
US9135426B2 (en) 2010-12-16 2015-09-15 Blackberry Limited Password entry using moving images
US8661530B2 (en) 2010-12-16 2014-02-25 Blackberry Limited Multi-layer orientation-changing password
US9258123B2 (en) 2010-12-16 2016-02-09 Blackberry Limited Multi-layered color-sensitive passwords
US8631487B2 (en) 2010-12-16 2014-01-14 Research In Motion Limited Simple algebraic and multi-layer passwords
US8863271B2 (en) 2010-12-16 2014-10-14 Blackberry Limited Password entry using 3D image with spatial alignment
US8745694B2 (en) 2010-12-16 2014-06-03 Research In Motion Limited Adjusting the position of an endpoint reference for increasing security during device log-on
US8931083B2 (en) 2010-12-16 2015-01-06 Blackberry Limited Multi-layer multi-point or randomized passwords
EP2466517B1 (en) * 2010-12-16 2017-05-24 BlackBerry Limited Simple algebraic and multi-layered passwords
US8650624B2 (en) 2010-12-16 2014-02-11 Blackberry Limited Obscuring visual login
GB2488310B8 (en) * 2011-02-02 2016-01-27 Winfrasoft Corp A method and system for authenticating a user of a computerised system
US8769668B2 (en) 2011-05-09 2014-07-01 Blackberry Limited Touchscreen password entry
US9223948B2 (en) 2011-11-01 2015-12-29 Blackberry Limited Combined passcode and activity launch modifier
GB2498350B (en) * 2012-01-09 2015-10-21 Gopalan Ketheeswaran Input device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425102A (en) * 1994-06-09 1995-06-13 Datasonix Corporation Computer security apparatus with password hints

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60207956A (en) * 1984-04-02 1985-10-19 Toshiba Corp Identification matching system
JPS63661A (en) * 1986-06-19 1988-01-05 Omron Tateisi Electronics Co Card processing system
JPS6473449A (en) * 1987-09-14 1989-03-17 Hitachi Ltd Password number inputting system
DK136192D0 (en) * 1992-11-09 1992-11-09 John Reipur FILTER
GB9424791D0 (en) * 1994-12-08 1995-02-08 Philips Electronics Uk Ltd Security code input
US6209104B1 (en) * 1996-12-10 2001-03-27 Reza Jalili Secure data entry and visual authentication system and method
WO2001077792A2 (en) 2000-04-07 2001-10-18 Rsa Security Inc. System and method for authenticating a user
GB2381603B (en) * 2001-10-30 2005-06-08 F Secure Oyj Method and apparatus for selecting a password
AU2003211960B2 (en) 2002-02-13 2009-12-10 Passlogy Co., Ltd. User authentication method and user authentication system
JP4090251B2 (en) * 2002-03-05 2008-05-28 パスロジ株式会社 Authentication device, authentication method, and program
US20050254650A1 (en) * 2002-09-12 2005-11-17 Shoji Sakurai Authentication system, authentication device, terminal device, and authentication method
US7644433B2 (en) * 2002-12-23 2010-01-05 Authernative, Inc. Authentication system and method based upon random partial pattern recognition
US7577987B2 (en) 2002-12-23 2009-08-18 Authernative, Inc. Operation modes for user authentication system based on random partial pattern recognition
JP4316311B2 (en) * 2003-07-03 2009-08-19 株式会社日立製作所 Authentication method using logical password, information processing apparatus, program, and recording medium
EP1676393B1 (en) * 2003-10-14 2018-12-05 Grid Data Security, Inc. Authentication system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425102A (en) * 1994-06-09 1995-06-13 Datasonix Corporation Computer security apparatus with password hints

Also Published As

Publication number Publication date
CA2689850A1 (en) 2007-09-07
CA2644272C (en) 2011-08-16
EP2002371A1 (en) 2008-12-17
EP2002371A4 (en) 2010-05-05
CA2644272A1 (en) 2007-09-07
WO2007098569A1 (en) 2007-09-07
CN101421737A (en) 2009-04-29
JP2009528601A (en) 2009-08-06

Similar Documents

Publication Publication Date Title
CN101421737B (en) Method and system for securing interface access via visual array paths in combination with hidden operators
CA2359119C (en) Method and apparatus for secure entry of access codes in a computer environment
CN104025106B (en) Captcha provision method
AU2013269368B2 (en) Method and system for secure user identification
KR100743854B1 (en) A method for preventing input information from exposing to observers
JP4952213B2 (en) Electronic device and password input program
US20110191592A1 (en) Secure Access by a User to a Resource
US20130139226A1 (en) Secure Authorization
WO2001077792A2 (en) System and method for authenticating a user
US20140157382A1 (en) Observable authentication methods and apparatus
JP2005535990A (en) Method and system for processing passwords entered by cell matching
Barabesi et al. Goodness-of-fit testing for the Newcomb-Benford law with application to the detection of customs fraud
CA2495445A1 (en) An arrangement and method of graphical password authentication
US20100199100A1 (en) Secure Access by a User to a Resource
US7689831B2 (en) Method and system for securing interface access via visual array paths in combination with hidden operators
CN101334826B (en) Method for utilizing image selection as verification mechanism and computer system
US20110010763A1 (en) Tool and method for generating passwords
CN102156831B (en) Method and system for protecting interface access security by combining visual array path with hidden operational character
US20100043079A1 (en) Code securing for a personal entity
US20060179471A1 (en) System and method for providing secure disclosure of a secret
CN113726975B (en) Image encryption method and device based on chaotic system, medium and electronic equipment
KR101188016B1 (en) Method for password input using vibration
Alfard et al. IoTGazePass: A new password scheme for IoT applications
KR20210002310U (en) A Multimodal Password Authentication System
Qin et al. A Graphical Password Scheme Based on Rounded Image Selection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: PASSRULES CANADIAN SECURITY INC.

Free format text: FORMER OWNER: GOERTZEN NORMAN FRANK

Effective date: 20140313

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20140313

Address after: Manitoba Canada

Patentee after: Paz Ruth safety Canada Ltd

Address before: Manitoba Canada

Patentee before: Norman.Frank.Grid Cen

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110420

Termination date: 20160301